Solved

what is the difference between in role seize and role transfer and how we can perform this task?

Posted on 2009-04-04
3
1,178 Views
Last Modified: 2012-05-06
what is the difference between in role seize and role transfer and how can we  perform these task?
Can you explain step by step.
0
Comment
Question by:chandar_bhandari
3 Comments
 
LVL 3

Expert Comment

by:kchat
ID: 24070414
0
 
LVL 58

Accepted Solution

by:
tigermatt earned 500 total points
ID: 24070794

FSMO roles are one of the fundamental components of Active Directory; the define five (5) operations which can only ever be performed at one DC at any one time. With the exception of these roles, Active Directory for the most part is multi-master and any action can be taken against any DC.

An FSMO role TRANSFER is the graceful movement of the roles from a live, working DC to another live DC. This could be performed in any situation - such as if you build a new DC and wish to migrate Active Directory over, or for any other reason. During the process, the current DC holding the role(s) is updated, so it becomes aware it is no longer the role holder.

An FSMO role SEIZE is when a DC holding one (or more) roles has failed and will never return to the network. The roles need to be re-located to a live, working DC. A transfer operation will not succeed because the old DC is not contactable; the roles must therefore be forcefully seized. In other words, it's a transfer operation, but the old DC is never notified the role holders have changed.

If you perform a seizure of the FSMO roles from a DC, you need to ensure two things: the current holder is actually dead and offline, and that the old DC will NEVER return to the network. If you do an FSMO role Seize and then bring the previous holder back online, you'll have a problem.

-Matt
0
 

Author Comment

by:chandar_bhandari
ID: 24135131
thanks .. Matt
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This very simple solution applies to a narrow cross-section of the "needs to close" variety. In this case, the full message in Event Viewer was in applog, Event ID 1000: Faulting application iexplore.exe, version 8.0.6001.18702, faulting module …
Many companies are making the switch from Microsoft to Google Apps (https://www.google.com/work/apps/business/). Use this article to learn more about what Google Apps has to offer and to help if you’re planning on migrating to Google Apps. It is …
The viewer will learn how to simulate a series of coin tosses with the rand() function and learn how to make these “tosses” depend on a predetermined probability. Flipping Coins in Excel: Enter =RAND() into cell A2: Recalculate the random variable…
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question